Him, an adventurer, CISO, soldier, Marine, law officer, author, professor, spy, yachty, motorcyclist, photographer. Her, was the church lady librarian, got divorced, joined a motorcycle gang, became a hacker, and world adventurer.

Main menu

Category: Book/Article Reviews

Books or articles of interest and reviews of them. If you have a book that you think may be of interest please let us know and we or one of our contributors will review the book. We reserve the right to rip to shreds any book that makes us feel that way. Or, just not do it.

RAND recently released the Counterinsurgency Scorecard: Afghanistan in early 2011 relative to the insurgencies of the past 30 years. I read this with considerable interest as the topic (insurgency) and methodology (Delphi study) interest me greatly. The use of experts…

The following is a critique of the new policy document introduced by the Whitehouse on May 16th. All elements of the attribution policy of this blog/website apply. Though I’m critical of the document in general it is consistent with previous…

I’ve wanted for some time to increase the number of book reviews I publish and to get them up a little faster. I’ve been re-reading a bunch of my computer security books and the review for today is Computer Capers:…

A couple of thing you should know about me. First, I am in the process of completing my PhD and second, I have recently taken up running. I began both of these pursuits reluctantly. I began my PhD course work…

Sometimes a book comes along that just by the title you have to read. In a rather thin book you find between the hard covers a discussion of the love of reading. The different ideas of how to read. Though…

This book as part of the movement that doesn’t appear to have gotten off the ground is an influential to me short story of what education could become. The book is fairly old so we can see how little effect…

This book is a work of fiction looking at the special operations forces working in Northern Vietnam, Cambodia and Laos near the end of the war. The author provides and excellent view into the fictional world of these actors with…

The author Ronald Krutz takes the reader through the various elements of cyber security as it is applied to SCADA systems. Documenting the various protocols and issues in depth the author mentions some very specific threats to cyber security that…

“Cyberpower and National Security” edited by Fraklin D. Kramer, Stuart H. Starr, and Larry K. Wentz is a deep dive book into the substantive literature and ideas of the interaction between cyberspace, conflict, people, politics, and the diplomacy of deciding…

I wrote a chapter for a book called “Threats in the age of Obama” that was edited by Michael Tanji and there were many superior authors included Dan tdaxp, Christopher Albon, Matt Armstrong, Matthew Burton, Molly Cernicek, Christopher Corpora, Shane…

A new book is out “Threats in the age of Obama” with chapters by many fine writers. The book is a look at the national security implications and issues from some outsiders and former insiders. The book has articles on…

The Chicagoboyz are hosting the round table I’m looking forward to the adventure of bouncing some ideas off them. For the purposes of the round table I will be posting at Chicagoboys. I will post an abstract here and link to the Chicagoboyz post. The chancellor…

The Center for Strategic and International Studies (CSIS) recently released a report titled “Securing Cyberspace for the 44th Presidency: A report of the CSIS commission on cybersecurity for the 44th presidency”. This report is an in depth look at policy…

When I received “The black swan: The impact of the highly improbable” by Nassim Nicholas Taleb (Random House, New York, 2007), I was intrigued by a view into the financial world of high finance. In the interest of saving you…

Small Wars Journal accepted advertising from the National Association of Scholars presenting Academic Questions as an upcoming publication. Published as an academic journal by Springer I was both intrigued and worried. As an academic I sort through the normal morass…

RSS Links

Cyber?

Cyber security and the technologies of securing the information enterprise of industry and government require a trans-disciplinary while still STEM focused research agenda. The term “cyber” itself denotes a human cognitive centric concept that deals with the disintermediation of technology centered within human activity. The changing focus from system threat mitigation to enterprise risk management has opened completely new areas of inquiry into security.